A knowledge base article about Vendor Security Assessment FAQs provided by the UC Berkeley IT Service Hub - Knowledge Portal
Units are allowed one (1) resubmission for Vendors with an overall Not Recommended rating. Before resubmitting, the Unit must ensure the Vendor has addressed the specific deficiencies identified in the initial assessment. If a Vendor receives a second Not Recommended rating, please consider alternative vendors or apply for an exception.
Why is there a limit on resubmissions?
The roles that are typically involved in participating in a Vendor Security Assessment include the following:
|
Resource Owner or Proprietor |
Campus unit representative who has overall responsibility for the application (e.g., budgeting and resource allocation). |
|
Implementation Project Manager |
Unit member responsible for the roll-out of the application or service, including (but not limited to) Vendor selection, contract specifications, configuration, process-flow design, personnel training, etc. |
|
UC Buyer |
Representative in the UC Procurement department responsible for the Vendor contract negotiation. |
|
Vendor Representative |
Staff member of the service provider responsible for completing the Vendor Security Assessment Questionnaire. Ideally, this person is affiliated with the IT department and is knowledgeable regarding the Vendor's security framework. Oftentimes, the person in this role is a Sales or Customer Support Representative who facilitates communication between the vendor's IT staff and the ISO Assessor. |
|
ISO Assessor |
A member of the ISO analysts team is assigned as the primary assessor responsible for the engagement with the unit. |
What do I need to do to initiate a Vendor Security Assessment with the Information Security Office?
To request a Vendor Security Assessment Program evaluation for a PL2 system that is vendor-managed, review the Details of the Vendor Security Assessment Program and then send an email to security@berkeley.edu.
Please include the following information:
It is important to understand how a Vendor's services/products may use Artificial intelligence (AI) capabilities to ensure that use aligns with UC's policies, advisories, and guidelines on AI. AI functionality in Vendor services/products must be evaluated for security, privacy, and general AI risks.
Regarding the Vendor Security Assessment process and AI, the following are some key questions the Requester should be prepared to answer in coordination with the Vendor.
ISO will ask you to provide answers to these types of questions when we initially triage your VSA request:
Once a VSA is complete, ISO recommends reviewing the guidance letter and the Venminder report with your Unit Information Security Lead (UISL) to decide on the appropriate course of action for responding to the findings identified in the Venminder report. The ISO guidance letter, in particular, will provide information regarding what type of response the Unit requires per campus security policy.
The Requester is responsible for signing any Non-Disclosure Agreements with the Vendor and informing ISO which documents are under NDA.
Inform the ISO Assessments Team on the corresponding ServiceNow ticket for your VSA request if the Vendor is asking that ISO or Venminder sign the NDA.
Yes, the Requester will be responsible for providing the following information when requesting a VSA:
Additionally, the following security documents will speed up the assessment process:
ISO will no longer ask for the statement of work, contract/agreement, or the Vendor’s security plan.
A typical VSA takes 4 to 6 weeks to complete, starting on the date the Vendor has provided all requested information. Please plan accordingly.
What are the responsibilities and expectations for UCB Units and Vendors during the Vendor Security Assessment (VSA) process?
Units requesting a Vendor Security Assessment (VSA) should review the following document and share it with the Vendor so that they are prepared for the VSA process.
What is a "Vendor" or a "3rd-party service provider"?
A "Vendor" or "3rd-party service provider" is an entity (e.g., a person or a company), separate from the University, that offers something for sale. The typical types of Vendor services that require an ISO Vendor security assessment are technologies used to store, process, and/or transport protected data on behalf of the University, such as:
These types of Vendors are required to meet the same campus policy standards for the protection of protected data that is required for applications and services that are managed by internal campus IT resources.
My unit is contracting with a 3rd-party service provider for the handling of campus-protected data. The contract has already been signed. Should I still engage with ISO for a Vendor Security Assessment?
Although there is less bargaining power with the service provider to address security concerns after the contract has already been signed, it is still a good idea to perform a Vendor Security Assessment for service providers who are handling UC P3 or P4 data:
Vendors may be more inclined to participate in a security assessment after the contract has been signed, but before the service has been initiated, as billing often does not begin until services have started.
For VSA reports with an overall acceptable risk rating, any medium-level risk findings identified in the report should be discussed with the Vendor during the next contract renewal period.
Are Vendor services available to the campus that have already been approved for UC P2/3 or UC P4 data?
There are several 3rd-party Vendor services that are readily available to the campus that have been approved for UC P2/P3 or UC P4 data. Campus units that adopt these 3rd-party services for the purpose of storing and sharing covered data can be assured that these vendors meet campus policy requirements.
Campus units that utilize these services for the handling of protected data should keep in mind that careful configuration and management of these applications is required to meet campus policy standards.
UC P4 Approved Services
UC P2/P3 Approved Services
Please visit the bConnected website to learn more about the MSSEI protection level ratings for each of these products: https://bconnected.berkeley.edu/collaboration-services
The Vendor Security Assessment Program is intended to ensure that service providers who handle UC P4 data on behalf of the University meet campus security policy requirements. This is achieved in two ways:
The contract with the 3rd-party service provider has already been signed, and the UCOP Data Security & Privacy Appendix was not included. How will this affect the Vendor Security Assessment?
For all UC contracts involving third-party access to covered data, the University of California Office of the President (UCOP) requires the inclusion of the Data Security and Privacy Appendix. The appendix establishes baseline protection for the University in the event of a data breach. Campus units that engage with service providers to handle covered data must ensure the appendix is included in new contracts without edits.
For VSAP engagements that have been initiated after the contract has been approved, and the UCOP appendix has been omitted, the final assessment report will include contract-related risk findings. These findings are generally of a Critical risk nature, e.g.:
In these cases, the unit may be required to suspend the use of the service until the contract issues have been resolved with the Vendor.